Cryptography Reference
In-Depth Information
Shamir, A. Identity-based cryptosystems and signature schemes. Advances in Cryptology:
Proceedings of CRYPTO 84, Lecture Notes in Computer Science (Springer-Verlag) 196 (1984):
47-53.
Susilo, W., and Y. Mu. Non-interactive deniable ring authentication. Lecture Notes in Computer
Science (Springer-Verlag) 2971 (2003): 386-401.
Zhang, F., and K. Kim. ID-based blind signature and ring signature from pairings. Lecture
Notes of Computer Science (Springer-Verlag) 2501 (2002): 629-637.
Zhang, F., R. Safavi-Naini, and W. Susilo. An efficient signature scheme from bilinear pair-
ings and its applications. Lecture Notes in Computer Science (Springer-Verlag) 2947 (2004):
277-290.
Search WWH ::




Custom Search